Analysis
-
max time kernel
200s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe
-
Size
421KB
-
MD5
572f50eb7c7d94afced99b0c1b8724d8
-
SHA1
f349f7568e665b8615fd4269ad6a39475bf0d70f
-
SHA256
600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea
-
SHA512
0f8c0637fb2517a48dd05a96c04c3115f74cfda48ac43bbc755611760086c4734bd61291eed02f30986a3cb118dd90240795ad62b21bdae544d96d532a4bfd81
-
SSDEEP
12288:5T3eW7l7FGiMbhsAAW6BTx+MnxvzsK3T:5Tn8iMeWijG
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:81
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2044-56-0x0000000000360000-0x0000000000372000-memory.dmp asyncrat -
Modifies registry class 5 IoCs
Processes:
600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\CID 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\CID\{7A004D00-4F00-7200-5700-6D0030003900}\1 = "YkJgr72M98HaFp37v3EQDs5YiM4T4E1fclJ5ZeIfHjU0TwROj5d7FJwUaB41Brws1HsXaIVraLbbo273cT1lCG0POez5kxDSKT9mNN8aLj1JE3yYxxxvc0/ZyGQLhZc+2KbAcoQb15pB2owdIGtN4R4bGCnovaP9pGqDN/QMmwJHc13dVOHvHn8e1iBXpa+AHSPbvDNmiCjj1CDa1ZUyCq78L0MpF7HAlYa5i1mbzANHwNla6FnoAUSNXtGLNQ2bl/MGqTgJ9GfP6tZv/8jGa/33BUY9Uk9FMCa9n2EhO721LvEq6fdj5okFbJix+2GtkQgC1TV3dL3pX1IUpDbrmp7dDNMCJdQGmcaPdGgbu8KAB4UrJZh55oJ84HmP8SRX6oxr3RNIhdsPt20D3nJ0S8Vujjm559TrJjScl+68SQundAUvhReE+97fY6//7/yTxx4/1R1zxqKtmhCOUBYOMw==" 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\CID\{74007900-6A00-3900-4500-6E0073006500} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\CID\{74007900-6A00-3900-4500-6E0073006500}\1 = "85xdR7OkApYJrTppSzWYw9bdaULBNDlzKEtmL9nsTk4aQ55etJ+VwQj6+XTFfA5ep77sYngF2clmA0obCn9MNSnpjTJnACa/hkKw1/C1HEi8PjlLm4DwC+db2L6on02IHtF+P9B+CgN865arVzdVdUWhdRa7b3o49uwOTLJ6H186VBGThfXka1BSEyKQwrVg" 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\CID\{7A004D00-4F00-7200-5700-6D0030003900} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe -
NTFS ADS 6 IoCs
Processes:
600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exedescription ioc process File created C:\Users\Admin\Documents\My Music:{7A004D00-4F00-7200-5700-6D0030003900} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe File created C:\MSOCache:{7A004D00-4F00-7200-5700-6D0030003900} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe File created C:\Users\Admin\AppData\Local\Temp:{74007900-6A00-3900-4500-6E0073006500} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe File created C:\Users\Admin\Documents\My Music:{74007900-6A00-3900-4500-6E0073006500} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe File created C:\MSOCache:{74007900-6A00-3900-4500-6E0073006500} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe File created C:\Users\Admin\AppData\Local\Temp:{7A004D00-4F00-7200-5700-6D0030003900} 600465b5abd64472a5ce757f02c010e92b3e71516c87b2d610ff388a18b4eaea.exe